- International Journal of Applied Information Systems
- Foundation of Computer Science (FCS), NY, USA
- Volume ICCCV 2016 - Number 2
- Year of Publication:
- /li>
- 10.5120/icccv201666
- Manish M Potey and C. A. Dhote and Deepak Sharma 2016. Predicting VoLTE Quality using Random Neural Network. IJAIS Proceedings on International Conference on Communication Computing and Virtualization. ICCCV 2016, 2 (July 2016), 29-32. DOI=http://dx.doi.org/10.5120/ijais451392
-
@article{10.5120/ijais2017451568, author = {Manish M Potey and C. A. Dhote and Deepak Sharma}, title = {Predicting VoLTE Quality using Random Neural Network}, journal = {IJAIS Proceedings on International Conference on Communication Computing and Virtualization}, issue_date = {July 2016}, volume = {ICCCV 2016}, number = {}, month = {July}, year = {2016}, issn = {}, pages = {29-32}, numpages = {}, url = {/archives/volumeICCCV 2016/number2/923-923-2016451587}, doi = { 10.5120/icccv201666}, publisher = { © 2015 by IJAIS Journal}, address = {} }
-
%1 451392 %A Manish M Potey %A C. A. Dhote %A Deepak Sharma %T Predicting VoLTE Quality using Random Neural Network %J IJAIS Proceedings on International Conference on Communication Computing and Virtualization %@ %V ICCCV 2016 %N %P 29-32 %D 2016 %I © 2015 by IJAIS Journal
Abstract
In managed security model the focus is on security provided as cloud service; i. e. security delivered through the cloud instead of on-premise security solutions. Identity and Access Management (IAM) focuses on authentication, authorization, administration of Identities and audit. Its primary concern is verification of identity of entity and granting correct level of access for resources which are protected in the cloud environment. The IAM implemented as managed cloud service can benefit the user with all the advantages offered by Security-as-a-service model (SECaaS). This paper discusses implementation of a proof-of-concept (POC) of transparent managed IAM service. This prototype has been also evaluated. The relevant technologies are discussed for providing secure access to cloud users.
References
Keywords
Voice quality, VoLTE, MOS, WB-PESQ, RNN